Computers in the Composition Classroom


Book Description

Computers in the Composition Classroom introduces new teachers and scholars to the best thinking and practices that inform sound computer-assisted writing pedagogy. Chapters focus on critical issues such as literacy and access; identity and online writing practices; composing online; and the future of technology and writing.




Computer Programs for Qualitative Data Analysis


Book Description

Written by qualitative researchers for qualitative researchers, and not presuming extensive computer experience, this user-friendly guide takes a critical look at the wide range of software currently available. The book gives detailed reviews of 24 programs in five major categories: text retrievers, textbase managers, code-and-retrieve programs, code-based theory-builders and conceptual network-builders. In addition, the book provides ratings of over 75 features per program. The authors also offer detailed guidance on the operation of each program, helping the reader to ask key questions about the use of the computer - the nature of the project being undertaken, what time-line analyses are planned and what worksheets are re




Core Software Security


Book Description

"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamitis. Carnegie Mellon University"... a must read for security specialists, software developers and software engineers. ... should be part of every security professional’s library." —Dr. Larry Ponemon, Ponemon Institute"... the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. ...A must-have for anyone on the front lines of the Cyber War ..." —Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates"Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! "—Eric S. Yuan, Zoom Video CommunicationsThere is much publicity regarding network security, but the real cyber Achilles’ heel is insecure software. Millions of software vulnerabilities create a cyber house of cards, in which we conduct our digital lives. In response, security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts, cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative, innovative people who write software. Core Software Security expounds developer-centric software security, a holistic process to engage creativity for security. As long as software is developed by humans, it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development, which lies at the heart of our cyber infrastructure. Whatever development method is employed, software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people, process, and technology Highlights the key success factors, deliverables, and metrics for each phase of the SDL Examines cost efficiencies, optimized performance, and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book’s SDL framework View the authors' website at http://www.androidinsecurity.com/




The ARPANET Sourcebook


Book Description

In the early days of computer networking IBM mainframes could only connect to other IBM mainframes, Burroughs only to other Burroughs, etc. Beginning in 1967 the US Defense Department's Advanced Research Projects Agency (ARPA) office sponsored development of a "heterogeneous" network compatible with computers from any manufacturer. That R&D effort, one of the most successful in history, resulted in the on-time, on-budget construction of the revolutionary ARPANET, the immediate predecessor of today's Internet. The ARPANET Sourcebook: The Unpublished Foundations of the Internet reproduces the seminal papers, reports, and RFCs that led to the birth of modern network computing. Most appear here in book form for the first time. Part A, Imagining the ARPANET, covers the initial studies of network feasibility and includes: the introductory and concluding chapters of Paul Baran's seminal but little-known RAND research report On Distributed Communications in which packet switching was first conceptualized. the classic 1968 paper The Computer as a Communication Device by J.C.R. Licklider and Robert Taylor, respectively the ARPANET's earliest proponent and the ARPA administrator who pushed the development project. Part B, Planning the ARPANET includes: scans of the earliest RFCs ("Requests for Comments"), some publicly available here for the first time. RFCs were in effect the design documents for the ARPANET and later the Internet. the 1968 ARPA-commissioned SRI study that modeled a heterogeneous network and concluded that it was indeed feasible. forewords by Steve Crocker (author of RFC #1) and Leonard Kleinrock (noted author and head of the UCLA computing lab that hosted the first ARPANET node). Part C, Building the ARPANET, reproduces the quarterly technical reports from the government's contractor Bolt Beranek and Newman contemporaneously describing the development group's progress, difficulties encountered, and final success. Dave Walden, former BBN VP and a key member of the ARPANET team, has contributed a retrospective Foreword. Other noteworthy material: historical perspectives from Peter Salus, Robert Taylor, Willis Ware, Michael Padlipsky, and Les Earnest, and a long-forgotten RFC which anticipated JAVA by more than 20 years.







Inner Loops


Book Description

With practical advice and a broad sampling of important algorithms, Inner Loops shows how to design programs that extend the edge of the envelope of PC performance. It provides a thorough review of 32-bit code optimization for the 486, Pentium and Pentium Pro, as well as design tips for writing fast 32-bit software.




Open Source Licensing


Book Description

"I have studied Rosen's book in detail and am impressed with its scope and content. I strongly recommend it to anybody interested in the current controversies surrounding open source licensing." --John Terpstra, Samba.org; cofounder, Samba-Team "Linux and open source software have forever altered the computing landscape. The important conversations no longer revolve around the technology but rather the business and legal issues. Rosen's book is must reading for anyone using or providing open source solutions." --Stuart Open Source Development Labs A Complete Guide to the Law of Open Source for Developers, Managers, and Lawyers Now that open source software is blossoming around the world, it is crucial to understand how open source licenses work--and their solid legal foundations. Open Source Initiative general counsel Lawrence Rosen presents a plain-English guide to open source law for developers, managers, users, and lawyers. Rosen clearly explains the intellectual property laws that support open source licensing, carefully reviews today's leading licenses, and helps you make the best choices for your project or organization. Coverage includes: Explanation of why the SCO litigation and other attacks won't derail open source Dispelling the myths of open source licensing Intellectual property law for nonlawyers: ownership and licensing of copyrights, patents, and trademarks "Academic licenses" BSD, MIT, Apache, and beyond The "reciprocal bargain" at the heart of the GPL Alternative licenses: Mozilla, CPL, OSL and AFL Benefits of open source, and the obligations and risks facing businesses that deploy open source software Choosing the right license: considering business models, product architecture, IP ownership, license compatibility issues, relicensing, and more Enforcing the terms and conditions of open source licenses Shared source, eventual source, and other alternative models to open source Protecting yourself against lawsuits




Microsoft Sourcebook for the Help Desk


Book Description

reference includes a complete update of all topics covered in the first edition, plus plenty of information on important new topics including migration, Intranet and Internet strategies, and help desk strategies in multi-vendor environments. The CD contains templates, checklists, and customizable ""maps"" of decision-making criteria.




The HTML Sourcebook


Book Description

Much more than a tutorial, this sourcebook contains a comprehensive description of HTML commands, techniques, and tools necessary to create professional-quality Web page documents. Includes complete coverage of HTML 3.0 the Common Gateway Interface (CGI) Standard, experimental HTML features such as Netscape extensions, and Web document design. (Communications/Networking)




Computer Sourcebook


Book Description

Computer Sourcebook is the perfect resource for anyone who wants maximum efficiency from their time and computer. It covers hardware, software and support; training and seminars; online and print publications; and much more.